Cisco discovered several flaws in Sierra Wireless AirLink ES450 devices

Pierluigi Paganini April 27, 2019

Experts at Cisco Talos group disclosed a dozen vulnerabilities in Sierra Wireless AirLink gateways and routers, including several serious flaws.

Researchers at Cisco Talos group disclosed a dozen vulnerabilities affecting Sierra Wireless AirLink gateways and routers, including several serious flaws. Some of the flaws could be exploited to execute arbitrary code, modify passwords, and change system settings,

Sierra Wireless AirLink gateways and routers are widely used in enterprise environments to connect industrial equipment, smart devices, sensors, point-of-sale (PoS) systems, and Industrial Control systems (ICSs).

“Several exploitable vulnerabilities exist in the Sierra Wireless AirLink ES450, an LTE gateway designed for distributed enterprise, such as retail point-of-sale or industrial control systems.” reads the analysis published by Cisco Talos.

“These flaws present a number of attack vectors for a malicious actor, and could allow them to remotely execute code on the victim machine, change the administrator’s password and expose user credentials, among other scenarios.”

Most of the issues reside in ACEManager, the web server included with the ES450. 

Sierra Wireless es450

Experts discovered three flaws classified as “critical” (CVSS score 9.9) that can be exploited by an attacker to make changes to any system settings and execute arbitrary commands and code. An authenticated attacker could exploit the flaw by sending specially crafted HTTP requests to the targeted device.

Other three flaws, rated as “high severity,” could be exploited by an authenticated attacker to change the user password and obtain plaintext passwords and other sensitive information. One of the issues affects the SNMPD function of the Sierra Wireless AirLink ES450  and it can be exploited by attackers to activate hardcoded credentials on a device, resulting in the exposure of a privileged user.

The remaining issues have been classified as “medium severity,” they include cross-site request forgery (CSRF), cross-site scripting (XSS), and information disclosure issues.

At the time of writing, Sierra Wireless has yet to release a security advisory for these vulnerabilities.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – IoT, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

you might also like

leave a comment